SKILL BENCHMARK
CompTIA A+ Core 2 Mastery Benchmark (Expert Level)
- 31m
- 31 questions
The CompTIA A+ Core 2 Mastery Benchmark (Expert Level) benchmark measures your ability to identify, explain, and solution-design core mobile and desktop computing technologies and participate in conversations about said technologies. Learners who score high on this benchmark demonstrate that they have a mastery of computing, are subject matter experts on the topic, and generally do not require any remediation. They can proceed directly to the exam.
Topics covered
- describe common internet browsing security features and techniques including pop-up blockers, clearing browsing data, clearing cache, private-browsing mode, sign-in/browser data synchronization, and ad blockers
- differentiate between different script file types, including .bat, .ps1, .vbs, .sh, .js, and .py
- differentiate between full, incremental, differential, and synthetic backups
- differentiate between Master Boot Record (MBR) and GUID Partition Table (GPT) disks
- differentiate between on-site and off-site backup rotation schemes
- differentiate between phishing and vishing social engineering attacks
- list common backup frequency timelines
- list common home router security settings to configure on small office/home office (SOHO) wireless and wired networks
- list security concerns when working with Android mobiles
- list security login options such as usernames and passwords, personal identification number (pin), fingerprint, facial recognition and single sign-on (SSO)
- list the considerations for using scripts, including unintentionally introducing malware, inadvertently changing system settings, and causing crashes by mishandling resources
- name use cases for Secure Shell (SSH)
- outline common network traffic issues including high network traffic and sluggish response times
- outline common personal safety measures including disconnecting power before repairing PC, lifting techniques, electrical fire safety, safety goggles, and using air filtration masks
- outline how to gain root access on a mobile device
- outline how to set and meet expectations and timelines and communicate status with the customer
- outline virtual private network (VPN) technology
- outline what trojan malware is and how it can mislead users regarding its true intent
- recall various methods that can be used to install operating systems
- recognize compliance and government regulations
- recognize how to confirm whether or not a website is secure and provide an overview of certificates
- recognize how to deal with difficult customers or situations
- recognize how to identify malicious applications on a mobile device and outline application spoofing
- recognize how to implement traditional physical security measures including video surveillance, alarm systems, and motion sensors
- recognize how to match the required attire of the given environment
- recognize material safety data sheet (MSDS) handling and disposal recommendations, including proper battery disposal, proper toner disposal, and proper disposal of other devices and assets
- recognize scenarios for scripting, including automation, remapping network drives, updating, and gathering information
- recognize scenarios where you would use Remote Desktop Protocol (RDP)
- recognize the benefits of mobile device encryption features
- recognize the importance of using proper language and avoiding jargon, acronyms, and slang, when applicable
- recognize when to use the 3-2-1 backup rule